Aggregator
Submit #792433: Totolink A8000R V5.9c.681_B20180413 Improper Authentication [Accepted]
Submit #792392: itsourcecode Construction Management System V1.0 SQL Injection [Accepted]
15 лет за 100 «звезд» Telegram. Как подмосковную пенсионерку обвинили в терроризме из-за 230 рублей
EVTX Question
CVE-2026-34826 | Rack up to 2.2.22/3.1.20/3.2.5 Rack::Utils resource consumption (GHSA-x8cg-fq8g-mxfx / Nessus ID 304830)
CVE-2026-34877 | mbed TLS up to 2.19.0/3.6.5/4.0.0 memory corruption (Nessus ID 304831)
CVE-2026-35385 | OpenSSH up to 10.2 scp permissions (Nessus ID 304832)
CVE-2026-34763 | Rack up to 2.2.22/3.1.20/3.2.5 Regular Expression Rack::Directory permissive regular expression (GHSA-7mqq-6cf9-v2qp / Nessus ID 304833)
CVE-2026-34830 | Rack up to 2.2.22/3.1.20/3.2.5 Regular Expression Rack::Sendfile X-Accel-Mapping permissive regular expression (GHSA-qv7j-4883-hwh7 / EUVD-2026-18390)
CVE-2026-35387 | OpenSSH up to 10.2 control flow (Nessus ID 304835)
CVE-2026-35386 | OpenSSH up to 10.2 Command Line ssh_config incorrect behavior order (Nessus ID 304834)
CVE-2026-35414 | OpenSSH up to 10.2 Certificate authorized_keys control flow (Nessus ID 304837)
CVE-2026-34827 | Rack up to 3.1.20/3.2.5 Rack::Multipart algorithmic complexity (Nessus ID 304838)
CVE-2025-68664
Critical Claude Code Flaw Silently Bypasses Developer-Configured Security Rules
A high-severity security bypass vulnerability in Anthropic’s Claude Code AI coding agent allows malicious actors to silently evade user-configured deny rules through a simple command-padding technique, exposing hundreds of thousands of developers to credential theft and supply chain compromise. According to Adversa, the flaw was traced to bashPermissions.ts (lines 2162–2178), stems from a performance optimization […]
The post Critical Claude Code Flaw Silently Bypasses Developer-Configured Security Rules appeared first on Cyber Security News.
Hackers Using Fake “Microsoft Teams” Domains to Attack Users Via Malicious Payload
Cybercriminals are launching a sophisticated new wave of attacks using fake Microsoft Teams domains. According to recent threat intelligence shared by SEAL Org, hackers are actively tricking corporate users into downloading malicious payloads by mimicking the widely used communication platform. As Microsoft Teams remains an essential tool for remote and hybrid work environments, threat actors are […]
The post Hackers Using Fake “Microsoft Teams” Domains to Attack Users Via Malicious Payload appeared first on Cyber Security News.